Showing 1 - 12 results of 12 for search '"attack surface"', query time: 0.04s Refine Results
  1. 1
  2. 2

    Ransomware on cyber-physical systems: Taxonomies, case studies, security gaps, and open challenges by Mourad Benmalek

    Published 2024-01-01
    “…In recent years, ransomware has also started to target critical infrastructure and Cyber-Physical Systems (CPS) such as industrial control systems, smart grids, and healthcare networks. The unique attack surface and safety-critical nature of CPS introduce new challenges in defending against ransomware. …”
    Get full text
    Article
  3. 3

    MHSDN: A Hierarchical Software Defined Network Reliability Framework design by Zhengbin Zhu, Qinrang Liu, Dongpei Liu, ChenYang Ge, Chong Wang

    Published 2023-01-01
    “…Simultaneously, the attack surface measurement of MD is innovatively proposed, further improving the security and usability measurement standards of the MD system. …”
    Get full text
    Article
  4. 4

    A Secure Object Detection Technique for Intelligent Transportation Systems by Jueal Mia, M. Hadi Amini

    Published 2024-01-01
    “…However, due to the distributed nature of federated learning, there is a larger attack surface, making cyber-attack detection and defense challenging. …”
    Get full text
    Article
  5. 5

    Evaluation of Mechanical and Durability Properties of Eco-Friendly Concrete Containing Silica Fume, Waste Glass Powder, and Ground Granulated Blast Furnace Slag by Mahdi Bameri, Soroush Rashidi, Mohammad Mohammadhasani, Mohammad Maghsoudi, Hesam Madani, Fereydoun Rahmani

    Published 2022-01-01
    “…The properties evaluated in this study include compressive, tensile, and flexural strength, magnesium sulfate and sulfuric acid attack, surface resistivity, rapid chloride penetrability test (RCPT), water absorption, depth of penetration of water, and microstructure analysis by scanning electron microscopy (SEM). …”
    Get full text
    Article
  6. 6

    Quantum Key Distribution Applicability to Smart Grid Cybersecurity Systems by Warren Grice, Mohammed Olama, Annabelle Lee, Philip G. Evans

    Published 2025-01-01
    “…Unfortunately, the increased information flow will increase the potential attack surface and introduce new vulnerabilities. While a smarter grid will depend critically on information flow, these benefits will be accrued only if that information can be protected. …”
    Get full text
    Article
  7. 7

    An MLLM-Assisted Web Crawler Approach for Web Application Fuzzing by Wantong Yang, Enze Wang, Zhiwen Gui, Yuan Zhou, Baosheng Wang, Wei Xie

    Published 2025-01-01
    “…Web application fuzzing faces significant challenges in achieving comprehensive test interface (attack surface) coverage, primarily due to the complexity of user interactions and dynamic website architectures. …”
    Get full text
    Article
  8. 8

    Evaluating the Effectiveness of Zero Trust Architecture in Protecting Against Advanced Persistent Threats by Pushpendra Kumar Verma, Bharat Singh, Preety, Shubham Kumar Sharma, Rakesh Prasad Joshi

    Published 2024-12-01
    “…By taking a comprehensive approach to network security, the study evaluates how well Zero Trust Architecture mitigates security risks and shrinks the attack surface. It looks into the difficulties and factors to be taken into account when adopting Zero Trust Architecture, including scalability, user experience, and operational complexity. …”
    Get full text
    Article
  9. 9

    Hybrid dung beetle optimization based dimensionality reduction with deep learning based cybersecurity solution on IoT environment by Amal K. Alkhalifa, Nuha Alruwais, Wahida Mansouri, Munya A. Arasi, Mohammed Alliheedi, Fouad Shoie Alallah, Alaa O. Khadidos, Abdulrhman Alshareef

    Published 2025-01-01
    “…Cybersecurity analysts often refer to this as increasing the attack surface from which hackers can benefit. Implementing the proper security measures is crucial since IoT devices can be vulnerable to cyberattacks and are often built with limited security features. …”
    Get full text
    Article
  10. 10

    Assessment of the Distributed Ledger Technology for Energy Sector Industrial and Operational Applications Using the MITRE ATT&CK® ICS Matrix by Annabelle Lee, Sri Nikhil Gupta Gourisetti, David Jonathan Sebastian-Cardenas, Kent Lambert, Vicente Navarro, Marco Pasetti, Umit Cali, Kateryna Isirova, Ramesh Reddi, Puica Nitu, Md. Touhiduzzaman, Michael Mylrea, Philip Huff, Farrokh Rahimi, Shammya Shananda Saha

    Published 2023-01-01
    “…However, the deployment of these technologies increases the overall attack surface. The MITRE ATT&CK® matrices have been developed to document an adversary’s tactics and techniques based on real-world observations. …”
    Get full text
    Article
  11. 11

    Enfouissement du témoignage et archivage oraculaire dans Oracle Night de Paul Auster by François Hugonnier

    Published 2017-12-01
    “…This article explores the inscription of historical testimony within fictional frames, by way of collage, fragmentation, ellipsis, chronological reshuffling and polyphonia, whose upshot is the broadening of the writer’s scope after 1945. Here the 9/11 attacks surface fleetingly, by way of a belated negative.…”
    Get full text
    Article
  12. 12

    Safety of Systems Integrating Fire Protection Equipment – Risks, Gaps, Recommendations by Wojciech Wróblewski, Dorota Seliga

    Published 2024-12-01
    “…Project and methods: A detailed review of the literature and cybersecurity standards applicable to fire protection systems, such as NFPA 72, was conducted, from which key points that are vulnerable elements and represent attack surfaces were identified. The Cybersecurity for Fire Protection Systems report from a workshop held by the Research Foundation in 2021 was analysed. …”
    Get full text
    Article